#!/usr/bin/python # -*- coding:utf-8 -*- import urllib2 import re import string from sgmllib import SGMLParser cl
原创
2010-11-24 20:19:00
633阅读
点赞
我的电邮是:[email]Yuewm36@163.com[/email] QQ:276256127
我的空间是:[url]Http://hi.baidu.com/core22[/url]
Google空间是:[url]Http://yuewm36.googlepages.com[/url]
原创
2006-12-15 23:08:25
408阅读
Hacking python系列视频
http://pnig0s.blog.51cto.com/393390/338711
转载
2010-08-06 23:46:38
444阅读
python以简洁和易上手著称,在多平台下的通用性好,是动态语言的典型代表。《unix编程艺术》的作者曾说“精明的perl黑客们都投向了python,而且再也不回头”
本教程由hornet兄弟录制,视频中大量的实例,如brute-force暴力破解,找网站后台,SYN扫描和ARP欺骗,伪造来源IP,嗅探,DNS欺骗等等
对编程初学者,网络安全爱好者,有着非常大的参考作用
转载
精选
2010-06-24 19:32:53
2187阅读
点赞
PRESISTENCE Persistence programs start when the system starts. Backdoors -> maintain our access. Keylogger -> spy on target. Reports -> send report on
转载
2019-10-09 22:26:00
251阅读
Cross-platform hacking All programs we wrote are pure python programs They do not rely on OS-specific resources. Result: They work on any OS with a py
转载
2019-10-07 12:04:00
64阅读
Refactoring - Creating a Listener Class Creating a Backdoor class:
转载
2019-10-05 17:18:00
110阅读
A program that records keys pressed on the keyboard. Common features: Store logs locally(local keyloggers). Report logs to an email or remote server(r
转载
2019-10-04 18:40:00
541阅读
跟一下python-websocket-server怎么使用,这个lib还算是目前想用的。
转载
2017-10-06 18:52:00
230阅读
2评论
Polish the Python code by adding the become_persistent function. Convert to Windows executable file. Execute the reverse_backdoor file on the victim W
转载
2019-10-13 11:43:00
194阅读
REVERSE_BACKDOOR Access file system. Execute system commands. Download files. Upload files. Persistence. BACKDOORS An interactive program gives access
转载
2019-10-05 16:18:00
156阅读
Report function: Run in the background. Don't interrupt program execution. Every X seconds, send the report. ->Great case for threading.
转载
2019-10-05 11:15:00
202阅读
What is DNS Spoofing Sniff the DNSRR packet and show on the terminal. Analyze the following DNSRR records. Redirecting DNS Responses The set_payload()
转载
2019-09-01 17:56:00
300阅读
Handling Errors: If the client or server crashes, the connection will be lost. Backdoor crashes if: An incorrect command is sent. The correct command
转载
2019-10-07 11:48:00
301阅读
File Upload: A file is a series of characters. Uploading a file is the opposite of downloading a file. Therefore to transfer a file we need to: 1. Rea
转载
2019-10-07 10:49:00
70阅读
File Download: A file is a series of characters. Therefore to transfer a file we need to: 1. Read the file as a sequence of characters. 2. Send this s
转载
2019-10-07 09:45:00
164阅读
REVERSE_BACKDOOR - cd command Access file system: cd command changes current working directory. It has 2 behaviours: cd -> shows current working direc
转载
2019-10-06 23:05:00
60阅读
BACKDOORS Sockets Problem: TCP is stream-based. Difficult to identify the end of message/batch. Solution: Make sure the message is well defined. Imple
转载
2019-10-06 22:01:00
156阅读
Object-Oriented Programming Keylogger Classes Way of modeling program(blueprint). Logically group functions and data. Makes code more readable. More r
转载
2019-10-05 12:18:00
76阅读
1,Test:
telnet target port
stats:check the information
set pnig0s 0 0 10
pnig0s1992
get pnig0s
if echo "stored" then it works well.
stats slabs:lis all slabs of this memcached sev
原创
2011-07-07 12:19:10
754阅读